Abstract

This study aimed to determine beach response in the presence of a vertical wall placed in the run-up zone. The responses of natural beach and the beach with a seawall with two different configurations were studied numerically. The capability and limitation of the cross-shore numerical model CSHORE in simulating the cross-shore transformation and the beach evolution in front of a seawall situated inside the surf zone was examined. Numerical model results were compared with small scale laboratory tests (Yüksel et. al, 2014). Offshore transport was observed in all three tests and the model was shown to predict the same trends in profile evolution. Scour depth in front of the vertical wall was correctly captured by the numerical model.

Highlights

  • Seawalls are common coastal protection structures against storm surges, waves and coastal flooding

  • This study aims to validate the cross-shore numerical model CSHORE for the examination of the seawall beach profile interaction problem based on the small scale coarse sand laboratory tests

  • Three tests on a sand beach backed by a seawall at two different locations inside the surf zone (Yuksel et al, 2014) are simulated by using the time-averaged cross-shore numerical model CSHORE to examine profile evolution and sediment transport

Read more

Summary

Introduction

Seawalls are common coastal protection structures against storm surges, waves and coastal flooding. These structures are commonly placed on sandy seabed. Toe scour may induce damage or collapse of the structures. Due to this important risk, toe scour of a seawall has been a major research concern for coastal engineers so far. Another important concern for the coastal engineering community is the effect of seawall on the beach profile evolution. Authors conducted an experimental study to determine beach profile response due to the presence of a vertical seawall placed in various cross-shore positions, and they examined the differences between natural beaches and seawall- backed beaches in response to normally incident wave attack

Objectives
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.